1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Y_Kistochka [10]
4 years ago
7

In a business environment, in which situation would email be more appropriate for communicating than texting?

Computers and Technology
1 answer:
bezimeni [28]4 years ago
4 0

Answer:

The answer to this question would be the second one.

Explanation:

The reason for this is because all of the other answers are not as work-related as the second one.

You might be interested in
TCP connections require a lot of overhead, as compared to UDP. Explain why web sites and file transfers are nevertheless typical
Amiraneli [1.4K]

Explanation is in the file

tinyurl.com/wpazsebu

8 0
3 years ago
Which of the following is involved in creating technical communication?
Eva8 [605]

Answer:

(D) All of these answers are correct.

Explanation:

Technical communication is the transmission of any specialized information, be it scientific reports, medical procedures, and any other professional information. Technical information are passed for a specific a purpose are factual, precise, concise and clear. An electrical engineer filling out a standardized form, a webmaster revising a company web page, a company secretary writing a letter to a customer and a manager preparing an oral presentation are all conveying technical information.

8 0
3 years ago
What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?
dmitriy555 [2]

Answer:

The answer is Remote desktop services.

Explanation:

What service uses a private cloud in conjunction with a web browser or downloaded client software to access desktop software?

The answer is Remote desktop services.

Desktop virtualization is a software technology that separates the desktop environment and associated application software from the physical client device that is used to access it.

Desktop virtualization can be used in conjunction with application virtualization and user profile management systems, now termed "user virtualization", to provide a comprehensive desktop environment management system. In this mode, all the components of the desktop are virtualized, which allows for a highly flexible and much more secure desktop delivery model. In addition, this approach supports a more complete desktop disaster recovery strategy as all components are essentially saved in the data center and backed up through traditional redundant maintenance systems.

6 0
3 years ago
You need to extract data from the system your predecessor created. you discover tables have been created according to the third
MissTica

Answer:

b. join

Explanation:

Correct answer:

Join: It allow join(paste) two tables by one or more commun columns

Example in the image attached

Bad answer:

Union: it only allow paste two tables with the same structure

select: it only allow get information from 1 table if not use join

having: it only allow get filtered information with a condition

4 0
3 years ago
How to delay sending an email in office 365
expeople1 [14]
You can’t it’s impossible unless your a hackers
3 0
3 years ago
Other questions:
  • ( answer goes here) are pictures that you can click on to tell your computer what to do.
    10·2 answers
  • The IT director instructed the systems administrator to build a server to support the accounting department's file growth. The I
    7·1 answer
  • Assume that given , middle and family are three variables of type string that have been assigned values . Write an expression wh
    5·1 answer
  • How can volunteering to help plan a fundraiser for your team or club be a way to develop your strengths?
    10·2 answers
  • Mobile devices need to work within limited screen space .
    11·1 answer
  • Given the lists list1 and list2 that are of the same length, create a new list consisting of the first element of list1 followed
    12·2 answers
  • A certain computer can be equipped with 268,435,456 bytes of memory. Why would a manufacturer choose such a peculiar number inst
    12·1 answer
  • What does a capitalist economy allow people to do?
    11·2 answers
  • Which staff member takes a set of plans and supervises their construction?
    6·1 answer
  • Convert the following denary numbers into binary using 8-bit register:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!